Searched defs:payload_len (Results 1 - 25 of 40) sorted by relevance

12

/external/tcpdump/
H A Dprint-ip6.c57 register u_int payload_len; local
73 payload_len = EXTRACT_16BITS(&ip6->ip6_plen);
74 len = payload_len + sizeof(struct ip6_hdr);
100 payload_len);
/external/android-clat/
H A Dnetlink_msg.c52 * payload_len - bytelength of structure
54 struct nl_msg *nlmsg_alloc_generic(uint16_t type, uint16_t flags, void *payload_struct, size_t payload_len) { argument
62 if ((sizeof(struct nl_msg) + payload_len) > msg->nm_size) {
67 msg->nm_nlh->nlmsg_len = NLMSG_LENGTH(payload_len);
71 memcpy(nlmsg_data(msg->nm_nlh), payload_struct, payload_len);
H A Dtranslate.c127 * payload_len - length of other data inside packet
131 void fill_ip_header(struct iphdr *ip, uint16_t payload_len, uint8_t protocol, argument
139 ip->tot_len = htons(sizeof(struct iphdr) + payload_len);
161 * payload_len - length of other data inside packet
165 void fill_ip6_header(struct ip6_hdr *ip6, uint16_t payload_len, uint8_t protocol, argument
170 ip6->ip6_plen = htons(payload_len);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.c116 * @payload_len: Payload length in bytes (data after Type)
126 * payload_len bytes and has the EAP header and Type field already filled in.
128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
136 payload_len;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.c116 * @payload_len: Payload length in bytes (data after Type)
126 * payload_len bytes and has the EAP header and Type field already filled in.
128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
136 payload_len;
/external/wpa_supplicant_8/wpa_supplicant/
H A Dhs20_supplicant.c37 size_t payload_len)
42 buf = gas_anqp_build_initial_req(0, 100 + payload_len);
53 wpabuf_put_data(buf, payload, payload_len);
72 const u8 *payload, size_t payload_len)
92 buf = hs20_build_anqp_req(stypes, payload, payload_len);
36 hs20_build_anqp_req(u32 stypes, const u8 *payload, size_t payload_len) argument
71 hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_common.c116 * @payload_len: Payload length in bytes (data after Type)
126 * payload_len bytes and has the EAP header and Type field already filled in.
128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
136 payload_len;
/external/libnfc-nci/src/nfa/dm/
H A Dnfa_dm_ndef.c241 UINT32 payload_len)
273 if ((payload_len>1) && (p_payload[0] == p_cb->p_ndef_handler[i]->uri_id))
370 UINT32 payload_len; local
437 p_payload = NDEF_RecGetPayload (p_rec, &payload_len);
440 if ((p_handler = nfa_dm_ndef_find_next_handler (NULL, tnf, p_type, type_len, p_payload, payload_len)) == NULL)
455 p_handler = nfa_dm_ndef_find_next_handler (p_handler, tnf, p_type, type_len, p_payload, payload_len);
467 ndef_data.len = payload_len + (UINT32) (p_payload - p_rec);
519 p_handler = nfa_dm_ndef_find_next_handler (p_handler, tnf, p_type, type_len, p_payload, payload_len);
236 nfa_dm_ndef_find_next_handler(tNFA_DM_API_REG_NDEF_HDLR *p_init_handler, UINT8 tnf, UINT8 *p_type_name, UINT8 type_name_len, UINT8 *p_payload, UINT32 payload_len) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
171 WPA_PUT_BE16(length, payload_len);
196 if (pos + payload_len > buf + buf_size)
198 os_memmove(pos, payload, payload_len);
199 pos += payload_len;
217 crypto_hash_update(hmac, payload, payload_len);
150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.c143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
171 WPA_PUT_BE16(length, payload_len);
196 if (pos + payload_len > buf + buf_size)
198 os_memmove(pos, payload, payload_len);
199 pos += payload_len;
217 crypto_hash_update(hmac, payload, payload_len);
150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.c143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
171 WPA_PUT_BE16(length, payload_len);
196 if (pos + payload_len > buf + buf_size)
198 os_memmove(pos, payload, payload_len);
199 pos += payload_len;
217 crypto_hash_update(hmac, payload, payload_len);
150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/
H A Dnfc_hal_nci.c528 UINT8 payload_len; local
546 payload_len = *p++;
577 if ((nfc_hal_cb.max_rf_credits) && (payload_len > 5))
/external/libnfc-nci/src/nfc/ndef/
H A Dndef_cho_utils.c131 UINT32 payload_len; local
145 payload_len = (UINT32)carrier_type_len + carrier_data_len + 2;
151 (UINT8*)p_id_str, id_len, payload, payload_len);
169 UINT32 payload_len; local
176 payload_len = 3 + (UINT8)strlen (p_carrier_data_ref_str);
180 payload_len += 1 + (UINT8)strlen (p_aux_data_ref_str[xx]);
186 NULL, 0, NULL, payload_len);
194 p = NDEF_RecGetPayload (p_rec, &payload_len);
263 UINT32 payload_len; local
272 payload_len
301 UINT8 payload_len, id_len; local
535 NDEF_MsgAddMediaWifiWsc(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, char *p_id_str, UINT8 *p_payload, UINT32 payload_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c146 size_t payload_len)
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
190 size_t payload_len)
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
290 size_t payload_len)
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_gpsk.c256 size_t payload_len)
269 end = payload + payload_len;
564 size_t payload_len)
576 end = payload + payload_len;
251 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
559 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_pwd.c186 const u8 *payload, size_t payload_len)
196 if (payload_len < sizeof(struct eap_pwd_id)) {
214 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id));
220 data->id_server_len = payload_len - sizeof(struct eap_pwd_id);
268 const u8 *payload, size_t payload_len)
460 const u8 *payload, size_t payload_len)
183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
26 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_tls_common.c21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
28 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c146 size_t payload_len)
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
190 size_t payload_len)
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
290 size_t payload_len)
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_gpsk.c256 size_t payload_len)
269 end = payload + payload_len;
564 size_t payload_len)
576 end = payload + payload_len;
251 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
559 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_pwd.c186 const u8 *payload, size_t payload_len)
196 if (payload_len < sizeof(struct eap_pwd_id)) {
214 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id));
220 data->id_server_len = payload_len - sizeof(struct eap_pwd_id);
268 const u8 *payload, size_t payload_len)
460 const u8 *payload, size_t payload_len)
183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
26 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_tls_common.c21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
28 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c146 size_t payload_len)
158 if (eap_sake_parse_attributes(payload, payload_len, &attr))
190 size_t payload_len)
208 if (eap_sake_parse_attributes(payload, payload_len, &attr))
290 size_t payload_len)
304 if (eap_sake_parse_attributes(payload, payload_len, &attr))
141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_tls_common.c21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
28 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,

Completed in 485 milliseconds

12